Another great day with the kids at JOAD. Bulls eye bombers JOAD is in an interesting position...
Sam
Call for Chapters Chapter Proposals Due: February 20, 2009 Information Assurance and security Ethics in...
After a long hiatus on writing about archery something for people to think about. I love archery....
Can “On War” as a book from the dustbin of history reach out and touch the technologically...
The 44th president of the United States while not a technologist is an avid user of technology....
When considering the variable methods of depicting a model it sometimes is not so obvious what will...
When considering the generation warfare model as a tool of categorizing the types or scopes of conflict...
What can a user do that will obscure the path to analysis of a computer system so...
The idea of nation state conflict and conflict of ideology becomes a descriptive problem when looking at...
There was the .com bubble; there was the correction due to terrorism. There have been myriad fiascos...
There is a fairly substantial body of work that looks at the difference between hierarchical organized groups...
The Chicagoboyz are hosting the round table I’m looking forward to the adventure of bouncing some ideas off them. For...
The Center for Strategic and International Studies (CSIS) recently released a report titled “Securing Cyberspace for the...
The fall 2008 semester ITS 470 Large Scale High Performance Systems course completed a project to produce...
The Anti-Library as suggested in Talebs book on Black Swans really interested me. There has been some...